github.com/recobe182/terraform@v0.8.5-0.20170117231232-49ab22a935b7/builtin/providers/aws/resource_aws_key_pair_test.go (about) 1 package aws 2 3 import ( 4 "fmt" 5 "strings" 6 "testing" 7 8 "github.com/aws/aws-sdk-go/aws" 9 "github.com/aws/aws-sdk-go/aws/awserr" 10 "github.com/aws/aws-sdk-go/service/ec2" 11 "github.com/hashicorp/terraform/helper/resource" 12 "github.com/hashicorp/terraform/terraform" 13 ) 14 15 func TestAccAWSKeyPair_basic(t *testing.T) { 16 var conf ec2.KeyPairInfo 17 18 resource.Test(t, resource.TestCase{ 19 PreCheck: func() { testAccPreCheck(t) }, 20 Providers: testAccProviders, 21 CheckDestroy: testAccCheckAWSKeyPairDestroy, 22 Steps: []resource.TestStep{ 23 resource.TestStep{ 24 Config: testAccAWSKeyPairConfig, 25 Check: resource.ComposeTestCheckFunc( 26 testAccCheckAWSKeyPairExists("aws_key_pair.a_key_pair", &conf), 27 testAccCheckAWSKeyPairFingerprint("d7:ff:a6:63:18:64:9c:57:a1:ee:ca:a4:ad:c2:81:62", &conf), 28 ), 29 }, 30 }, 31 }) 32 } 33 34 func TestAccAWSKeyPair_generatedName(t *testing.T) { 35 var conf ec2.KeyPairInfo 36 37 resource.Test(t, resource.TestCase{ 38 PreCheck: func() { testAccPreCheck(t) }, 39 Providers: testAccProviders, 40 CheckDestroy: testAccCheckAWSKeyPairDestroy, 41 Steps: []resource.TestStep{ 42 resource.TestStep{ 43 Config: testAccAWSKeyPairConfig_generatedName, 44 Check: resource.ComposeTestCheckFunc( 45 testAccCheckAWSKeyPairExists("aws_key_pair.a_key_pair", &conf), 46 testAccCheckAWSKeyPairFingerprint("d7:ff:a6:63:18:64:9c:57:a1:ee:ca:a4:ad:c2:81:62", &conf), 47 func(s *terraform.State) error { 48 if conf.KeyName == nil { 49 return fmt.Errorf("bad: No SG name") 50 } 51 if !strings.HasPrefix(*conf.KeyName, "terraform-") { 52 return fmt.Errorf("No terraform- prefix: %s", *conf.KeyName) 53 } 54 return nil 55 }, 56 ), 57 }, 58 }, 59 }) 60 } 61 62 func testAccCheckAWSKeyPairDestroy(s *terraform.State) error { 63 ec2conn := testAccProvider.Meta().(*AWSClient).ec2conn 64 65 for _, rs := range s.RootModule().Resources { 66 if rs.Type != "aws_key_pair" { 67 continue 68 } 69 70 // Try to find key pair 71 resp, err := ec2conn.DescribeKeyPairs(&ec2.DescribeKeyPairsInput{ 72 KeyNames: []*string{aws.String(rs.Primary.ID)}, 73 }) 74 if err == nil { 75 if len(resp.KeyPairs) > 0 { 76 return fmt.Errorf("still exist.") 77 } 78 return nil 79 } 80 81 // Verify the error is what we want 82 ec2err, ok := err.(awserr.Error) 83 if !ok { 84 return err 85 } 86 if ec2err.Code() != "InvalidKeyPair.NotFound" { 87 return err 88 } 89 } 90 91 return nil 92 } 93 94 func testAccCheckAWSKeyPairFingerprint(expectedFingerprint string, conf *ec2.KeyPairInfo) resource.TestCheckFunc { 95 return func(s *terraform.State) error { 96 if *conf.KeyFingerprint != expectedFingerprint { 97 return fmt.Errorf("incorrect fingerprint. expected %s, got %s", expectedFingerprint, *conf.KeyFingerprint) 98 } 99 return nil 100 } 101 } 102 103 func testAccCheckAWSKeyPairExists(n string, res *ec2.KeyPairInfo) resource.TestCheckFunc { 104 return func(s *terraform.State) error { 105 rs, ok := s.RootModule().Resources[n] 106 if !ok { 107 return fmt.Errorf("Not found: %s", n) 108 } 109 110 if rs.Primary.ID == "" { 111 return fmt.Errorf("No KeyPair name is set") 112 } 113 114 ec2conn := testAccProvider.Meta().(*AWSClient).ec2conn 115 116 resp, err := ec2conn.DescribeKeyPairs(&ec2.DescribeKeyPairsInput{ 117 KeyNames: []*string{aws.String(rs.Primary.ID)}, 118 }) 119 if err != nil { 120 return err 121 } 122 if len(resp.KeyPairs) != 1 || 123 *resp.KeyPairs[0].KeyName != rs.Primary.ID { 124 return fmt.Errorf("KeyPair not found") 125 } 126 127 *res = *resp.KeyPairs[0] 128 129 return nil 130 } 131 } 132 133 func testAccCheckAWSKeyPair_namePrefix(t *testing.T) { 134 var conf ec2.KeyPairInfo 135 136 resource.Test(t, resource.TestCase{ 137 PreCheck: func() { testAccPreCheck(t) }, 138 IDRefreshName: "aws_key_pair.a_key_pair", 139 IDRefreshIgnore: []string{"key_name_prefix"}, 140 Providers: testAccProviders, 141 CheckDestroy: testAccCheckAWSKeyPairDestroy, 142 Steps: []resource.TestStep{ 143 resource.TestStep{ 144 Config: testAccCheckAWSKeyPairPrefixNameConfig, 145 Check: resource.ComposeTestCheckFunc( 146 testAccCheckAWSKeyPairExists("aws_key_pair.a_key_pair", &conf), 147 testAccCheckAWSKeyPairGeneratedNamePrefix( 148 "aws_key_pair.a_key_pair", "baz-"), 149 ), 150 }, 151 }, 152 }) 153 } 154 155 func testAccCheckAWSKeyPairGeneratedNamePrefix( 156 resource, prefix string) resource.TestCheckFunc { 157 return func(s *terraform.State) error { 158 r, ok := s.RootModule().Resources[resource] 159 if !ok { 160 return fmt.Errorf("Resource not found") 161 } 162 name, ok := r.Primary.Attributes["name"] 163 if !ok { 164 return fmt.Errorf("Name attr not found: %#v", r.Primary.Attributes) 165 } 166 if !strings.HasPrefix(name, prefix) { 167 return fmt.Errorf("Name: %q, does not have prefix: %q", name, prefix) 168 } 169 return nil 170 } 171 } 172 173 const testAccAWSKeyPairConfig = ` 174 resource "aws_key_pair" "a_key_pair" { 175 key_name = "tf-acc-key-pair" 176 public_key = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3F6tyPEFEzV0LX3X8BsXdMsQz1x2cEikKDEY0aIj41qgxMCP/iteneqXSIFZBp5vizPvaoIR3Um9xK7PGoW8giupGn+EPuxIA4cDM4vzOqOkiMPhz5XK0whEjkVzTo4+S0puvDZuwIsdiW9mxhJc7tgBNL0cYlWSYVkz4G/fslNfRPW5mYAM49f4fhtxPb5ok4Q2Lg9dPKVHO/Bgeu5woMc7RY0p1ej6D4CKFE6lymSDJpW0YHX/wqE9+cfEauh7xZcG0q9t2ta6F6fmX0agvpFyZo8aFbXeUBr7osSCJNgvavWbM/06niWrOvYX2xwWdhXmXSrbX8ZbabVohBK41 phodgson@thoughtworks.com" 177 } 178 ` 179 180 const testAccAWSKeyPairConfig_generatedName = ` 181 resource "aws_key_pair" "a_key_pair" { 182 public_key = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3F6tyPEFEzV0LX3X8BsXdMsQz1x2cEikKDEY0aIj41qgxMCP/iteneqXSIFZBp5vizPvaoIR3Um9xK7PGoW8giupGn+EPuxIA4cDM4vzOqOkiMPhz5XK0whEjkVzTo4+S0puvDZuwIsdiW9mxhJc7tgBNL0cYlWSYVkz4G/fslNfRPW5mYAM49f4fhtxPb5ok4Q2Lg9dPKVHO/Bgeu5woMc7RY0p1ej6D4CKFE6lymSDJpW0YHX/wqE9+cfEauh7xZcG0q9t2ta6F6fmX0agvpFyZo8aFbXeUBr7osSCJNgvavWbM/06niWrOvYX2xwWdhXmXSrbX8ZbabVohBK41 phodgson@thoughtworks.com" 183 } 184 ` 185 186 const testAccCheckAWSKeyPairPrefixNameConfig = ` 187 resource "aws_key_pair" "a_key_pair" { 188 key_name_prefix = "baz-" 189 public_key = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3F6tyPEFEzV0LX3X8BsXdMsQz1x2cEikKDEY0aIj41qgxMCP/iteneqXSIFZBp5vizPvaoIR3Um9xK7PGoW8giupGn+EPuxIA4cDM4vzOqOkiMPhz5XK0whEjkVzTo4+S0puvDZuwIsdiW9mxhJc7tgBNL0cYlWSYVkz4G/fslNfRPW5mYAM49f4fhtxPb5ok4Q2Lg9dPKVHO/Bgeu5woMc7RY0p1ej6D4CKFE6lymSDJpW0YHX/wqE9+cfEauh7xZcG0q9t2ta6F6fmX0agvpFyZo8aFbXeUBr7osSCJNgvavWbM/06niWrOvYX2xwWdhXmXSrbX8ZbabVohBK41 phodgson@thoughtworks.com" 190 } 191 `